Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public... [more]
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document... [more]
This book shows the risks and protections cyberspace offers for national security and information warfare. [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Including easy-to-understand definitions of viruses, spyware, and hackers, this book helps you understand what you're up against... [more]
Since being introduced in the late nineties, Cascading Style Sheets or CSS has become an indispensable tool for every web... [more]
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification... [more]
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades... [more]
Suitable for Information Security professionals, managers of IT employees, business managers, organizational security officers,... [more]
Provides a non-technical approach to practical computer security for various users, from business professionals to students... [more]
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed... [more]
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network... [more]
Aims to map to the exam objectives for the Security Certified Network Professional exam. [more]
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network... [more]
Provides a comprehensive framework of practices for assuring information security, told through a real-world story and based... [more]
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications... [more]
This book describes the primary uses for Trusted Platform Modules (TPMs) and practical considerations such as: when TPMs can... [more]
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory... [more]
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security,... [more]
Written by two renowned researchers, this graduate level textbook provides a thorough grounding in the field of cryptography.... [more]
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of... [more]
A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this... [more]
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology... [more]